EasyManua.ls Logo

Check Point UTM-1 Edge - Page 398

Check Point UTM-1 Edge
707 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
SmartDefense Categories
384 Check Point UTM-1 Edge User Guide
Teardrop
In a Teardrop attack, the attacker sends two IP fragments, the latter entirely contained
within the former. This causes some computers to allocate too much memory and crash.
You can configure how Teardrop attacks should be handled.
Table 68: Teardrop Fields
In this field… Do this…
Action Specify what action to take when a Teardrop attack occurs, by selecting one
of the following:
Block. Block the attack. This is the default.
None. No action.
Track Specify whether to log Teardrop attacks, by selecting one of the following:
Log. Log the attack. This is the default.
None. Do not log the attack.

Table of Contents

Related product manuals